期刊文献+

改进的对等网络流量传输层识别方法 被引量:13

An Improved Transport Layer Identification of Peer-to-Peer Traffic
下载PDF
导出
摘要 P2P(peer-to-peer)流量识别问题是近年来网络测量研究中的热点问题.基于传输层行为的P2P流量识别方法不依赖P2P应用的特征字段,具有良好的可扩展性.然而网络应用的传输层行为通常极易受网络环境的影响,因此基于传输层行为的P2P流量识别方法在国内外不同的网络环境中,其准确性存在较大的差异.为了弥补现有P2P流量传输层识别方法在国内网络环境中的不足,提出了3条改进策略:1)基于非P2P知名端口的过滤机制;2)基于有效数据流的计数机制;3)基于反向流的FTP过滤机制.随后,在国内网络流量记录上验证了上述改进策略的有效性.实验结果表明,改进后的传输层识别方法,其P2P流识别准确率和P2P字节识别准确率分别接近95%和99%.最后,在国内率先使用改进的P2P流量传输层识别方法对中国教育科研网的骨干网流量记录进行了分析.测量结果表明,国内骨干网上P2P流量所占的比例已经由过去的0.76%上升到70%左右. Peer-to-peer (P2P) traffic identification is a hot topic in network measurement in recent years. The identification method based on P2P traffic transport layer behavior has good scalability, because it is independent of the signature strings of P2P application. But the network application's behavior in transport layer is easy to be affected by network environment, so there is a great difference in the accuracy of this identification method between domestic and overseas network environment. In order to improve the existing transport layer identification method in domestic network environment, three proposals are offered in this paper. The first is a filtering mechanism based on non-P2P known port. The second is a counting mechanism using data flow. The third is an FTP flow filtering mechanism using reversed flow. Then, these proposals are validated using the domestic traces. The result of experiments indicates that the flow accuracy and bytes accuracy of the improved P2P traffic transport layer identification method approach 95% and 99% respectively. Finally, this improved method is firstly used to analyze the trace of the Internet backbone in China Education and Research Network. The result of measurement shows that the volume of P2P traffic increases from 0. 76% roughly to 70% of the total traffic in the backbone.
出处 《计算机研究与发展》 EI CSCD 北大核心 2008年第5期794-802,共9页 Journal of Computer Research and Development
基金 国家“九七三”重点基础研究发展规划基金项目(2007CB307100,2007CB307106)~~
关键词 网络测量 对等网络 流量识别 传输层 网络行为 network measurement peer-to-peer traffic identification transport layer network behavior
  • 相关文献

参考文献16

  • 1刘琼,徐鹏,杨海涛,彭芸.Peer-to-Peer文件共享系统的测量研究[J].软件学报,2006,17(10):2131-2140. 被引量:36
  • 2S Sen,J Wang.Analyzing peer-to-peer traffic across large networks[C].The 2nd ACM SIGCOMM Workshop on Internet Measurement,Marseille,France,2002
  • 3S Sen,O Spatscheck,D M Wang.Accurate,scalable innetwork identification of P2P traffic using application signatures[C].The 13th Int'l WWW Conf,New York,2004
  • 4T Karagiannis,A Broido,M Faloutsos,et al.Transport layer identification of P2P traffic[C].The 4th ACM SIGCOMM Conf on Internet Measurement,Taormina,Sicily,Italy,2004
  • 5A Madhukar,C Williamson.A longitudinal study of P2P traffic classification[C].The 14th IEEE Int'l Symp on Modeling,Analysis,and Simulation,Monterey,USA,2006
  • 6T Karagiannis,A Broido,N Brownlee,et al.Is P2P dying or just hiding[C].The IEEE Globecom 2004,Dallas,USA,2004
  • 7T Karagiannis,K Papagiannaki,M Faloutsos.BLINC:MultileveI traffic classification in the dark[C].The ACM SIGCOMM 2005,Philadelphia,Pennsylvania,USA,2005
  • 8K Keys,D Moore,R Koga,et al.The architecture of the CoralReef:Internet traffic monitoring software suite[C].The 2nd Passive and Active Measurement Workshop(PAM2001),Amsterdam,2001
  • 9A W Moore,K Papagiannaki.Toward the accurate identification of network applications[C].The 6th Passive and Active Measurement Workshop(PAM2005),Boston,USA,2005
  • 10T Karagiannis.Application Spedfic Bit-Strings[OL].http://www.cs.ucr.edu/_tkarag/papers/strings.txt,2004

二级参考文献41

  • 1Sen S, Wang J. Analyzing peer-to-peer traffic across large network[A]. In: Proceedings of ACM Sigcomm Internet Measurement Workshop[C]. Marseille, France: Nov. 2002.
  • 2Saroiu S, Gummadi P K, Gribble S D. A Measurement Study of Peer-to-Peer File Sharing Systems[A]. In: Proceedings of Multimedia Computing and Networking [C]. Jan. 2002.
  • 3Leibowitz N, et al. Are File Swapping Networks Cacheable? Characterizing P2P Traffic[A]. In: Proceedings of 7th International Workshop on Web Content Caching and Distribution[C]. Aug. 2002.
  • 4B Krishnamurthy, J Wang, Y Xie. Early Measurements of a Clusterbased Architecture for P2P Systems[A]. In :Proceedings of ACM Sigcomm Internet Measurement Workshop[C]. Nov. 2001.
  • 5Netflow services and applications [EB/OL]. Http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/napps wp.htm.
  • 6Vern Paxson, Sally Floyd. Wide-Area Traffic: The Failure of Poisson Modeling[J], IEEE/ACM Transactions on Networking,3(3), June 1995. 
  • 7Gwendolyn Mariano. Schools Declare File-Swapping Truce[J/OL]. Http://news.com.com/2100-1023-859705.html ]Gwendolyn Mariano. Schools Declare File-Swapping Truce. Http://news.com.com/2100-1023-859705.html
  • 8Duffield N, Lund C, Thorup M. Properties and Prediction of Flow Statistics from Sampled Packet Streams[A]. In :Proceedings of ACM Sigcomm Internet Measurement Workshop[C]. Marseille, France: Nov. 2002.
  • 9Hagiwara T, Doi H, Tode H, Ikeda H. High-Speed Calculation Method of Hurst Parameter Based On Real Traffic[A]. In: proc.IEEE Conference on Local Computer Networks (LCN 2000)[C]. Tampa Florida, U.S.A: Nov. 2000.
  • 10Zhang H F, Shu Y T, Yang O. Estimation of Hurst Parameter by Varariance-Time Plots[A]. In Proceedings. IEEE Pacrim[C], 1997.

共引文献41

同被引文献121

引证文献13

二级引证文献95

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部